Latest Resources

2015 is shaping up to include some of the best innovation the mobile industry has ever experienced. There will be new discoveries, new technologies, and existing giants in the vendor space will test the limits to increase productivity while ensuring the confidentiality, integrity, and availability of data. While all of this innovation is taking place, enterprises must continue to remain vigilant as cybercriminals continue to look for weaknesses to steal company data, and intellectual property by infiltrating …

The old ways of implementing security and compliance mandates are no longer acceptable and the risk of high profile breaches has never been greater. With increased pressure on budgets, fewer resources and increasingly frequent audits, you need to find new ways to close security loopholes and reduce the window of vulnerability, speed remediation, and reduce the time and effort required to remain compliant.

Spear-phishing attacks are on the rise because they are so effective. They're designed to pinpoint and exploit human weaknesses by masquerading as safe messages from known contacts. It doesn't matter if you've drawn up what you think is the perfect blueprint to protect yourself -- spear-phishing attackers have done advanced scouting of your company's defenses and know exactly how to exploit vulnerabilities: the human vulnerabilities. Read this white paper for an inside look at the anatomy of a spear-phishing …

Security is an important factor regarding cloud computing. However, organizations well versed in cloud technologies find it's no longer a valid excuse for staying out of the cloud. This white paper covers the top nine threats of cloud computing. It also addresses their implications to enterprise security and offers possible solutions to avoid each threat.

Globalscape's Enhanced File Transfer™ (EFT™) High Security module (HSM), with the Auditing and Reporting module (ARM), helps achieve or exceed security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2 Validation, HIPAA, and Sarbanes-Oxley. This white paper discusses how EFT, the HSM, and ARM can help you achieve compliance and stay compliant with the PCI DSS.

"Facilitating Enterprise Compliance with Globalscape® EFT™ and the High-Security Module " is the property of …

Today's increasingly mobile workforce creates new challenges for organizations that rely heavily on collaboration. Businesses need to be both secure and collaborative, and they can't sacrifice one over the other. The plethora of devices and clouds used by mobile employees only complicates these challenges.

Watch this webcast and learn how your business can enable mobile access to files from anywhere while it helps to maintain information governance, compliance, and …

The Log Management industry was traditionally driven by regulatory compliance and security concerns resulting in a multi-billion dollar market focused on security and information event management (SIEM) solutions. However, log management has evolved into a market that is focused on both the management and analytics of log data. Log management technologies are becoming more powerful and dynamic, allowing for data to be easily extracted and analyzed from logs for a much wider range of use cases. For example, …

The threats to website security can be divided into two main
groups: those that arise from criminals and software vulnerabilities. While vulnerabilities affect us all, criminals pick and choose their targets.

Attend this live eSeminar to better understand how criminals choose their targets and for an expert discussion of how vulnerabilities and criminals work hand-in-hand to compromise security. Today's businesses need to protect …

Strengthen application protection--from design to deployment--to proactively address cloud security risks. This white paper explains how an effective application security program can help organizations protect their assets in the cloud. It will also discuss how a secure-by-design approach to application security can help reduce risk across the IT infrastructure, in the cloud and beyond.